Sciweavers

2075 search results - page 293 / 415
» Dynamics based control with an application to area-sweeping ...
Sort
View
ICML
1998
IEEE
15 years 11 months ago
Q2: Memory-Based Active Learning for Optimizing Noisy Continuous Functions
This paper introduces a new algorithm, Q2, foroptimizingthe expected output ofamultiinput noisy continuous function. Q2 is designed to need only a few experiments, it avoids stron...
Andrew W. Moore, Jeff G. Schneider, Justin A. Boya...
IV
2007
IEEE
155views Visualization» more  IV 2007»
15 years 4 months ago
Navani: Navigating Large-Scale Visualisations with Animated Transitions
When visualising datasets that are too large to be displayed in their entirity, interactive navigation is a common solution. However, instantaneous updates of the visualisation wh...
Kevin Pulo
HASE
1998
IEEE
15 years 1 months ago
Design for Constraint Violation Detection in Safety-Critical Systems
In safety-critical systems, certain safety constraints must be satisfied before an operation can be performed. Such constraints typically depend on the state of the system at the ...
Satish Subramanian, Sanjai Rayadurgam, Wei-Tek Tsa...
IJNM
2008
112views more  IJNM 2008»
14 years 10 months ago
How to avoid packet droppers with proactive routing protocols for ad hoc networks
Routing protocols for mobile ad hoc networks (MANETs) have been an active area of research for the last decade, with many very interesting potential as well as actual applications...
Ignacy Gawedzki, Khaldoun Al Agha
HASE
2008
IEEE
15 years 4 months ago
Low Cost Secure Computation for the General Client-Server Computation Model
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
Liangliang Xiao, I-Ling Yen, Farokh B. Bastani